Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Microsoft Warns Of Looming Digital Certificate Deadline

To improve Windows security, a Microsoft security update soon will block access to RSA digital certificates that have a key length of less than 1,024 bits.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Memo from Microsoft to Windows administrators: Make sure all of your digital certificates have at least 1,024 bits.

That warning comes as Microsoft prepares to release an automatic security update for Windows on Oct. 9, 2012, that will make longer key lengths mandatory for all digital certificates that touch Windows systems.

Notably, Internet Explorer won't be able to access any website secured using an RSA digital certificate with a key length of less than 1,024 bits. Likewise, without a strong enough certificate, certificate authority service in Windows won't be able to start, ActiveX controls might be blocked, users might not be able to install applications, and Outlook 2010 won't be able to encrypt or digitally sign emails, or communicate with an Exchange server for SSL/TLS communications. In addition, Microsoft warned that after its security update, Operations Manager will be unable to monitor--or discover new instances of--any HP-UX PA-RISC computers that don't have an RSA digital certificate of least 1,024 bits.

Microsoft's move reflects the relative ease with which digital certificates of less than 1,024 bits can now be cracked--or derived--via brute-force attacks. "The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks," according to Microsoft.

[ Read Cryptographers Discover Public Key Infrastructure Flaw. ]

The "fix" for keeping up with Microsoft's mandatory security improvement is simple. "For those who find they are using certificates with RSA key lengths of less than 1,024 bits, those certificates will be required to be reissued with at least a 1,024-bit key length," according to a Microsoft Security Resource Center blog post. It also noted that "1,024 should, by the way, be considered a minimum length; the most up-to-date security practices recommend 2048 bits or even better."

Microsoft's security update is available now for download. The company recommends that IT administrators gain familiarity with it, and test any existing processes that might break, before it releases the update via Microsoft Update in October. To help, a Microsoft knowledgebase article, Microsoft Security Advisory: Update for minimum certificate key length details tips and techniques for discovering any digital certificates in use that have a key length of less than 1,024, as well as recommendations for updating them.

The timing of Microsoft's digital certificate spring cleaning has no doubt been driven by the Flame malware, discovered in May, and inside which security experts found built a "collision attack" against the Microsoft Terminal Services encryption algorithm, which allowed the malware to successfully spoof that Windows service and automatically install itself on targeted PCs.

In the eyes of Marc Stevens, a crypto-analyst at the Centrum Wiskunde and Informatica (CWI) in Amsterdam who studied Flame, whoever created that collision attack was practicing "world-class cryptanalysis." But when it comes to malware attacks, what's leading edge quickly becomes commonplace, as known attack techniques get emulated by other attackers, and included as automated options in crimeware toolkits and the open source Metasploit penetration testing toolkit.

Mobile employees' data and apps need protecting. Here are 10 ways to get the job done. Also in the new, all-digital 10 Steps To E-Commerce Security special issue of Dark Reading: Mobile technology is forcing businesses to rethink the fundamentals of how their networks work. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
Andrew Hornback,
User Rank: Apprentice
9/8/2012 | 9:00:13 PM
re: Microsoft Warns Of Looming Digital Certificate Deadline
This isn't being accelerated due to Flame.

Sure, it makes the situation sound more dire because there's a (relatively) new threat out there that could take advantage of the inherent vulnerability involved in using shorter keys, but this has been around for a while.

Microsoft has been writing about this on TechNet for a while (see: A Note on Implementation of the Requirement to Issue Longer Key Length Certificates (December 7, 2010)). This revocation of 1024-bit keys has to do with NIST Special Publication 800-131A.

So, no, Microsoft isn't screaming about the sky falling because of Flame or the Terminal Services problem that was known about a while ago... it has to do with Federal cryptographic regulations. And this is something that any Windows Administrator worth their weight in salt has already implemented a remediation plan for.

Andrew Hornback
InformationWeek Contributor
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...